Sciweavers

8190 search results - page 1617 / 1638
» From Timed to Hybrid Systems
Sort
View
CIVR
2008
Springer
165views Image Analysis» more  CIVR 2008»
15 years 3 months ago
Balancing thread based navigation for targeted video search
Various query methods for video search exist. Because of the semantic gap each method has its limitations. We argue that for effective retrieval query methods need to be combined ...
Ork de Rooij, Cees G. M. Snoek, Marcel Worring
CIDR
2007
116views Algorithms» more  CIDR 2007»
15 years 3 months ago
Life beyond Distributed Transactions: an Apostate's Opinion
Many decades of work have been invested in the area of distributed transactions including protocols such as 2PC, Paxos, and various approaches to quorum. These protocols provide t...
Pat Helland
118
Voted
AVI
2004
15 years 3 months ago
Scalable Fabric: flexible task management
Our studies have shown that as displays become larger, users leave more windows open for easy multitasking. A larger number of windows, however, may increase the time that users s...
George G. Robertson, Eric Horvitz, Mary Czerwinski...
ECIS
2004
15 years 3 months ago
The Long Road to being an IS Professional: A Newcomer Perspective
The dot-com boom in the late 1990s attracted vast numbers of undergraduate students into the field of Information Systems (IS) with the promise of being the next "big thing&q...
Kim-Chung Leong, Michael T. K. Tan
127
Voted
DBSEC
2006
131views Database» more  DBSEC 2006»
15 years 3 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
« Prev « First page 1617 / 1638 Last » Next »